On one June afternoon in 2017, during an autoethnography of a malware analysis and detection laboratory, NotPetya quickly caused destruction. This malware has since been characterised as a key geopolitical event in cybersecurity, causing billions of dollars in damage as it rendered inoperable computers across the world. The hunt to identify those who had written NotPetya occurred almost immediately. However, this paper rearticulates this event through grammar, in a close reading of computation, to urge for a more-than-human reading of cybersecurity. By exploring the written propositions of the hackers, various computational materials – including hardware, code, and machine learning algorithms – as well as their ecologies, cybersecurity is u...
© 2019, The Author(s). Disruptive innovations of the last few decades, such as smart cities and Indu...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious ...
Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious ...
The article of record as published may be found at http://dx.doi.org/10.1145/3048379John Arquilla co...
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-w...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-w...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
k-state.edu/seek 29 Kansas State University cybersecurity researchers want you to know the differenc...
The study is an examination of hacking, placing the act in the context of theories of technological...
© 2019, The Author(s). Disruptive innovations of the last few decades, such as smart cities and Indu...
© 2019, The Author(s). Disruptive innovations of the last few decades, such as smart cities and Indu...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious ...
Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious ...
The article of record as published may be found at http://dx.doi.org/10.1145/3048379John Arquilla co...
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-w...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
Cyber-security is thus a very serious issue. Attacks can have catastrophic consequences. The cyber-w...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
This paper draws on the psychology of risk and "management guru" literature (Huczynski, 2006) to exa...
k-state.edu/seek 29 Kansas State University cybersecurity researchers want you to know the differenc...
The study is an examination of hacking, placing the act in the context of theories of technological...
© 2019, The Author(s). Disruptive innovations of the last few decades, such as smart cities and Indu...
© 2019, The Author(s). Disruptive innovations of the last few decades, such as smart cities and Indu...
This is an article about how cybersecurity gets “made,” with a focus on the role of commercial compu...
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...